关注
Shiuhpyng Shieh
Shiuhpyng Shieh
未知所在单位机构
在 g2.nctu.edu.tw 的电子邮件经过验证
标题
引用次数
引用次数
年份
IoT security: ongoing challenges and research opportunities
ZK Zhang, MCY Cho, CW Wang, CW Hsu, CK Chen, S Shieh
2014 IEEE 7th international conference on service-oriented computing and …, 2014
9712014
Password authentication schemes with smart cards
WH Yang, SP Shieh
Computers & Security 18 (8), 727-733, 1999
4511999
Taxonomy of security attacks in sensor networks and countermeasures
T Roosta, S Shieh, S Sastry
The first IEEE international conference on system integration and …, 2006
1652006
Imaged document text retrieval without OCR
CL Tan, W Huang, Z Yu, Y Xu
IEEE Transactions on Pattern Analysis and Machine Intelligence 24 (6), 838-844, 2002
151*2002
Emerging security threats and countermeasures in IoT
ZK Zhang, MCY Cho, S Shieh
Proceedings of the 10th ACM symposium on information, computer and …, 2015
1322015
An efficient broadcast authentication scheme in wireless sensor networks
SM Chang, S Shieh, WW Lin, CM Hsieh
Proceedings of the 2006 ACM symposium on information, computer and …, 2006
1102006
On a pattern-oriented model for intrusion detection
SP Shieh, VD Gligor
IEEE transactions on knowledge and data engineering 9 (4), 661-667, 1997
1101997
Secure encrypted-data aggregation for wireless sensor networks
SI Huang, S Shieh, JD Tygar
Wireless Networks 16 (4), 915-927, 2010
992010
Web application security: Threats, countermeasures, and pitfalls
HC Huang, ZK Zhang, HW Cheng, SW Shieh
Computer 50 (6), 81-85, 2017
942017
Keystroke statistical learning model for web authentication
CH Jiang, S Shieh, JC Liu
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
792007
Efficient key distribution schemes for secure media delivery in pay-TV systems
YL Huang, S Shieh, FS Ho, JC Wang
IEEE Transactions on Multimedia 6 (5), 760-769, 2004
732004
A pattern-oriented intrusion-detection model and its applications
SW Shieh
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991
691991
Defending against spoofed DDoS attacks with path fingerprint
FY Lee, S Shieh
Computers & Security 24 (7), 571-586, 2005
682005
Digital multisignature schemes for authenticating delegates in mobile code systems
SP Shieh, CT Lin, WB Yang, HM Sun
IEEE Transactions on Vehicular Technology 49 (4), 1464-1473, 2000
672000
Case instance generation and refinement for case-based criminal summary judgments in Chinese.
CL Liu, CT Chang, JH Ho
Journal of Information Science and Engineering 20 (4), 783-800, 2004
662004
S-AKA: A provable and secure authentication key agreement protocol for UMTS networks
YL Huang, CY Shen, SW Shieh
IEEE transactions on vehicular technology 60 (9), 4509-4519, 2011
592011
Construction of dynamic threshold schemes
HM Sun, SP Shieh
Electronics Letters 30 (24), 2023-2025, 1994
581994
Penetration testing in the iot age
CK Chen, ZK Zhang, SH Lee, S Shieh
computer 51 (4), 82-85, 2018
532018
Secret sharing in graph-based prohibited structures
HM Sun, SP Shieh
Proceedings of INFOCOM'97 2, 718-724, 1997
511997
An authentication protocol without trusted third party
SP Shieh, WH Yang, HM Sun
IEEE Communications Letters 1 (3), 87-89, 1997
481997
系统目前无法执行此操作,请稍后再试。
文章 1–20